Security to Outsource Data in Community Cloud with the Trusted Tenant System
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Cloud Computing is the dreamed vision of next-generation IT infrastructure. In cloud architecture community cloud shared among several user or organization for the common purpose. In cloud environment application and data placed to centralized data centres through which user can enjoy service like on demand, location independent and relieve from burden of storage and maintenance of data and reduced hardware soft ware cost. Placing the critical data in the hands of a cloud provider that fact that users no longer have possession to outsource data so cloud environment should guarantee of security of data to the user and fully trustworthy to use. Security of outsource data is very challenging task in cloud environment. We propose tenant system that provides the security to community cloud that guarantee security of data stored in server or motion in channel. In this paper two different encryption methods RC6 and SHA1 is used to provide the security to cloud data and the database. This architecture used OAuth technique for the user authentication to access the system and for the secure sharing of data to different user with in the cloud TTLS (Tunnel transport layer security) technique is used for secured sharing. The results of this system provide highly secured environment for data to place in cloud server and result ensure about the security of outsource data with different techniques at different level.

Keywords: Cloud computing, Security, RC6, OAuth SHA1, TTLS

Edition: Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Share this Article

How to Cite this Article?

Kundan Kunal, Dr. Latesh Malik, "Security to Outsource Data in Community Cloud with the Trusted Tenant System", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB153785, Volume 4 Issue 4, April 2015, 2703 - 2708

93 PDF Views | 85 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021

Pages: 594 - 596

A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud

K. Sreelatha

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 8, August 2013

Pages: 71 - 73

Cloud Computing and Its Types in Mobile Network

Palak Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 315 - 318

Cloud Computing - A Birds Eye View

S.Kalaiselvi, S.V.Revathi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Similar Articles with Keyword 'Security'

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Similar Articles with Keyword 'RC6'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 733 - 736

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

Vina M. Lomte, Archana D. Shinde

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3253 - 3257

BIST Based Secure Data Aggregation in Wireless Sensor Network

Rakesh Kumar Ranjan, S. P. Karmore

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1525 - 1527

To Secure Query Services in the Cloud with RASP Data Perturbation

Puja Bhaganagarkar, Dhanshree Kulkarni

Share this Article
Top